
Answer-first summary for fast verification
Answer: Develop and enforce a set of security requirements that include secure communication channels, strict access control measures, and uniform security policies across all cloud providers, tailored to the company's specific needs.
The BEST approach is to develop and enforce a comprehensive set of security requirements that are applied uniformly across all cloud providers. This ensures secure communication, proper access control, and consistent security policies, which are critical for maintaining a strong security posture in a multi-cloud environment. Tailoring these requirements to the company's specific needs ensures that the solution is both cost-effective and scalable. Relying solely on individual cloud providers' security measures or focusing only on network and endpoint security does not address the need for a unified security strategy across all cloud environments.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
Your company is expanding its IT infrastructure to adopt a multi-cloud strategy, utilizing services from multiple cloud providers to host applications and store data. This strategy aims to enhance flexibility and avoid vendor lock-in. However, the security team is concerned about maintaining a consistent security posture across all cloud environments. As the Cybersecurity Architect, you are tasked with ensuring the security of the multi-cloud environment. Which of the following approaches BEST addresses the security concerns by specifying comprehensive security requirements, including secure communication, access control, and consistent security policies across all cloud providers, while also considering cost-effectiveness and scalability? (Choose one)
A
Implement strong authentication mechanisms and data encryption for each cloud provider individually, without establishing a unified security policy.
B
Develop and enforce a set of security requirements that include secure communication channels, strict access control measures, and uniform security policies across all cloud providers, tailored to the company's specific needs.
C
Focus solely on securing the network infrastructure and endpoints that access the multi-cloud environment, neglecting the need for consistent security policies across cloud providers.
D
Depend entirely on the security measures provided by each cloud provider, assuming they will adequately protect the company's data and applications without additional oversight.